How to decrypt ransomwares

Ransomwares are becoming very common since (apparently) only a small percentage is taking backups. Most people and organizations have valuable data laying in their hard drives without taking any backups. Creators of ransomwares are aware of this and they encrypt their files asking for money to provide them the key to unlock their files. In many cases, people and organizations are paying the ransom, creators make profit and they create more, more difficult to decrypt ransomwares. In this post we will provide the solution, how to encrypt some of the ransomwares, if you are the victim of those ransomware then you are luckier than others.

Petya Ransomware

This ransomware doesn’t encrypt the files bug the master boot file and instead of booting to Windows it boots its code and asks for 0.9 Bitcoins to unlock and recover the master boot file.

If you are infected with petya ransomware you can use Petya Sector Extractor to extract the needed information and then use the Petya pay no ransom website to generate the key to unlock the infected PC. Visit the step-by-step guide on how to do it.

Hydracrypt and Umbrecrypt

Those ransomwares damage irrecoverably the last 15 bytes of the files. For some files like text files this is not an issue but for some other files that makes them unreadable.